


In this video we looked at how to prepare for a Security Control Assessment (SCA). What we need to do before, during and after the Assessment. Security Assessment Plan (SAP): - This document clearly defines the process, procedures, and methodologies for testing Information System Security Controls. Security Assessment Reports (SAR): - This documents is used to document all the results of the testings and assessments conducted. It also clearly defines the process, procedures and methodologies utilized for testing and assessing the security controls of an Information System. FedRAMP Documents and Templates https://www.fedramp.gov/documents-tem... Computer Security Resource Center https://csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: https://www.youtube.com/c/KamilSec?su... *************Patreon & Channel Support******************* https://www.patreon.com/kamilSec?fan_landing=true ********Order your KamilSec (KS) Designs Merch:********** https://kamilsec.creator-spring.com/ ************************************************************** Buy me a coffee if you appreciate my work https://buymeacoffee.com/kamilsec CashApp: $Kamilzak Zelle: kaamilzak@gmail.com Paypal: https://paypal.me/MZakari Thank You!!! ************************************************************* **I ALSO CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSION** Connect with me on Social Media: Twitter: https://twitter.com/Kamilzak_1 Instagram: @Kamilzak1

AI Meets Cybersecurity: Automating Vulnerability Analysis with Microsoft Copilot (Hands-on)
333 views

AI Automation for Business Professionals
118 views

Conducting Nessus Vulnerability Scan Results Analysis in 5 Minutes Using Pivot Table (Hands-on)
436 views

Governance Risk and Compliance (GRC)
498 views

Overview of the FedRAMP 800-53 Rev 5 New Test Case
822 views

Episode 9: Configuration Management Plan (CM-9 Explained) | KamilSec
787 views